automating network security profiles
play

Automating Network Security Profiles Vivek Kashyap Senior - PowerPoint PPT Presentation

Automating Network Security Profiles Vivek Kashyap Senior Technical Staff Member Linux Technology Center IBM Cloud Interface Image Cloud Controller repository Domain-N Control Domain-1 Control Image Image Image Host 1 Application


  1. Automating Network Security Profiles Vivek Kashyap Senior Technical Staff Member Linux Technology Center IBM

  2. Cloud Interface Image Cloud Controller repository Domain-N Control Domain-1 Control Image Image Image Host 1 Application Host 1 Application Application Operating Operating Operating System System System Host 2 Host 2 Virtual Server Virtual Server Virtual Server Virtualization Host 3 Host 3 Compute Domain n Domain 1 Storage Memory Network Multiple images deployed on physical nodes in the DataCenter/Cloud ● Network isolation a must for a viable multi-tenant solution ● Collaborative applications may be on same virtual network ● vivk@us.ibm.com Linux Collaboration Summit, 2011 2

  3. Network View Port Profile VM VM VM VM VM VM VM VM Virtual Switch Server VM VM VM VM Switch Virtual Switch Switch Switch Domain Edge Port External Network Definition External Network DataCenter consists of large number of physical and virtual switches ● Applications with different network profiles ─ Host vswitch provides guest-guest switching, filtering, bandwidth control ● Error-prone managing large deployments ─ Virtual switch is not integrated with network fabric management ─ inconsistencies and manual verification > For load-balancing, resiliency the KVM guests are mobile ● Network policies must continue to be applied to the KVM guest workload ─ Manually ensure target are correctly configured to support network profiles > Physical port security/profiles need to be re-programmed with mobility > vivk@us.ibm.com Linux Collaboration Summit, 2011

  4. Linux Virtual Networking Linux/KVM VM VM VM VM VM VM VM VM VM … … … VEB * * VEB F : PF VF VF VF PCIe VEB Adapter PCIe * Enet Port IOV Enet Port * Packet switching and filtering function Adjacent Switch * vivk@us.ibm.com Linux Collaboration Summit, 2011 4

  5. Automating Physical/Virtual Switching Edge Virtual Bridging: IEEE 802.1Qbg Linux/KVM Offload switching function to external ● bridge VM VM VM VM VM VM VM VM VM … … … VM's virtual interface directly tied to ─ physical switch port policies VEPA * VEB Simplified VEPA (Virtual Ethernet ─ Port Aggregator) bridging in F F hypervisor to send all packets to PCIe PCIe adjacent bridge. Adapter Adapter Enet Port Enet Port Provides packet replication of > Port in inbound frames. Reflective Physical switch port put in 'reflective ─ Relay relay' mode Mode * Sends packets back over same port > Adjacent Switch Con : Introduces limited latency ● VEPA: Virtual Ethernet Port Aggregator VEB: Virtual Ethernet Bridge (or, Linux bridge) vivk@us.ibm.com Linux Collaboration Summit, 2011 5

  6. How Does it Work?  The network profile – Used by one or more VMs – Unique id – Stored in database Port Profile  Switch advertises 802.1Qbg support VM Database VM VMVMVM VM VMVM  Linux/KVM host receives vSwitch VEPA advertisement (a.k.a. VEB) – Configures switch port in VEPA VM VMVMVM (hairpin_mode) Switch VEB – Offloads switching function Switch Switch  Linux/KVM sends to switch – unique id of network profile Domain Edge External Network External Network – MAC/VLAN information Port Definition  Switch retrieves profile – Enforces bandwidth, Access controls vivk@us.ibm.com Linux Collaboration Summit, 2011 6

  7. Creating a KVM Guest On success from step Server 5, libvirt instantiates System and starts the VM Admin Request creation Linux 7 of VM. Send VSI host state*, MAC Libvirt address, VLAN id. LLDPAD Apps Apps CIM EDP/VDP 4 User Space VM VM 3 Libvirt Daemon Create new VM’s network System state (i.e. MAC Manager KVM with VEPA Address, VLAN ID, VSI state*) 5 VSI Discovery VM begins 8 and communication, Configuration through KVM VEPA Protocol (VDP) Query available VSI 2 associate types Load VSI Obtain a VSI instance Type 6 Switch (a.k.a. Bridge) Network Admin Network (VSI Type) Manager Create set 0 L2 net(s) VSI Type of VSI Database Types *VSI state consists of the following: VSI Manager ID, VSI Instance ID, VSI Type ID, VSI Type Version. vivk@us.ibm.com Linux Collaboration Summit, 2011 7

  8. Simple extension to libvirt The VSI state is specified using the following domain XML extension ● <interface type='direct'/> <source dev='device name' mode='vepa' /> <model type='virtio'/> <virtualport type='802.1Qbg'> <parameters managerid='12' typeid='0x123456' typeidversion='1' instanceid='insert-uuid-here' /> </virtualport> </interface> Libvirt parses 'virtualport type' ● Sends netlink message with 'ASSOCIATE' request to LLDPAD ─ LLDPAD sends ASSOCIATE VDP message ─ Returns success or failure ─ On success KVM guest is created ─ vivk@us.ibm.com Linux Collaboration Summit, 2011 8

  9. Migration Steps VM is brought 7 on-line after VDP completes Pre-Associate Source Server Target Server System Admin to server’s migrate VM virtualization Apps Apps Apps Apps infrastructure Push VM Move VM VM VM VM VM Manager 1 4 VEB or VEPA VEB or VEPA Associate & Start-up VM 5 VDP Pre-Associate Move to VDP 2 VDP 6 with Resource Pre-Associate Associate Reservation state 8 VSI After target Switch 3 Manager VM up, De- Switch (a.k.a. Bridge) Associate and Retrieve (a.k.a. Bridge) terminate VM VSI VSI Type Information Database L2 net(s) vivk@us.ibm.com Linux Collaboration Summit, 2011 9

  10. Automatic Host based Virtual Switching Host vswitch ● Linux bridge + ebtables/iptables + tc ─ OpenVswitch (not in mainline) ─ Administrative simplification: Associate filter rules to Virtual machines ● Rules enforced in the kernel when guest started ─ Rules torn down when the guest is terminated ─ Rules may be modified at runtime ─ Rules may contain macros which get instantiated at runtime ─ IP Address, MAC address , more possible > » DHCP Snooping/first packet to determine IP Address vivk@us.ibm.com Linux Collaboration Summit, 2011 10

  11. Example Filter <filter name='no-ip-spoofing' chain='ipv4'> <uuid>fce8ae33-e69e-83bf-262e-30786c1f8072</uuid> <rule action='drop' direction='out' priority='500'> <ip match='no' srcipaddr='$IP'/> </rule> </filter> This filter may now be referenced with any guest by adding to the 'interface' element in the guest domain: <interface type='bridge'> <mac address='52:54:00:56:44:32'/> <source bridge='br1'/> <ip address=$IP/> <target dev='vnet0'/> <model type='virtio'/> <filterref filter='no-ip-spoofing'/> </interface> vivk@us.ibm.com Linux Collaboration Summit, 2011 11

  12. Status Linux 2.6.34 onwards ● VEPA mode (for IEEE 802.1Qbg support) ─ Bridging between virtual interfaces ─ Vhost-net interface for Qemu ─ GSO/GRO acceleration for macvtap ─ Libvirt 0.8.7 (http://libvirt.org/formatnwfilter.html) ● VEPA and VSI support ─ Netlink notifications for VDP protocol (to LLDPAD) > Support for host based filter rules ─ LLDPAD: ● Version lldpad 0.9.41 (open-lldp.org) ─ EVB TLVs, ECP/VDP > Libvirt-CIM: 0.5.12 ● Support for specifying VEPA, VSI state ─ vivk@us.ibm.com Linux Collaboration Summit, 2011 12

  13. A peek into the Future: Network Profile Automation Network extensions - Include filters in the Virtual Machine meta-data (e.g. in the OVF) Image - Filters takes macros, that are instantiated at deployment (as shown with libvirt) library - Management tooling uses it to create libvirt rules or vis data profiles OVF Query available port profile types B Port Profile DB VM C Port Profile Schema 1 Database Manager DB Client Interface Push VM & vPort DB-to-switch Linux/KVM: 2 Interface Switch Edge Retrieve Port VM Edge D Configuration to Configuration 4 • CIM provider (libvirt-CIM) VM Host or direct libvirt interface • Based on host capabilities VM and domain policy: A VM • Create ACL rules utilizing L2 net(s) vSwitch 3 the linux virtualization library(libvirt) VM vPort Discovery or VM • Create/use existing VSI profile to impose on the guest IEEE 802.1Qbg protocol support Server Edge vivk@us.ibm.com Linux Collaboration Summit, 2011

  14. Legal Statement This work represents the view of the author and does not necessarily represent the view of IBM. IBM is a registered trademark of International Business Machines Corporation in the United States and/or other countries. UNIX is a registered trademark of The Open Group in the United States and other countries . Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, and service names may be trademarks or service marks of others. vivk@us.ibm.com Linux Collaboration Summit, 2011 14

  15. Questions? vivk@us.ibm.com Linux Collaboration Summit, 2011 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend